Skip to main content

The Malware Museum

Mikko Hypponen

The Malware Museum is a collection of malware programs, usually viruses, that were distributed in the 1980s and 1990s on home computers. Once they infected a system, they would sometimes show animation or messages that you had been infected.



rss RSS

86
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
The Malware Museum
software

eye 64,301

favorite 18

comment 4

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
software

eye 50,968

favorite 22

comment 7

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 7 reviews )
The Malware Museum
software

eye 51,931

favorite 7

comment 3

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software

eye 51,387

favorite 7

comment 8

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 8 reviews )
The Malware Museum
software

eye 75,006

favorite 13

comment 4

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
software

eye 63,013

favorite 12

comment 4

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
The Malware Museum
software

eye 32,748

favorite 11

comment 6

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
The Malware Museum
software

eye 25,611

favorite 4

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 2 reviews )
The Malware Museum
software

eye 36,632

favorite 8

comment 6

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 6 reviews )
The Malware Museum
software

eye 21,583

favorite 6

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 17,712

favorite 6

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 14,446

favorite 1

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 13,871

favorite 1

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
by Mikko Hypponen
movies

eye 21,022

favorite 21

comment 0

Presented at DEF CON 19 in Las Vegas, Nevada in 2011. "It's 2011, so this year it's going to be 25 years since Brain.A, the first PC virus, Join Mikko Hypponen as he talks about the history and evolution of computer viruses. From Brain to Stuxnet, he's spent his career tracking malware and will give a pretty good rundown on what has happened, when and why it mattered. Mikko Hypponen is based in Helsinki, Finland. He has been analysing computer viruses for more than 20 years. He has written...
The Malware Museum
software

eye 18,043

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 23,156

favorite 5

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
by Daniel White
movies

eye 8,681

favorite 4

comment 4

A quick presentation on Virus History by Daniel White at Project Cyber Virus, held on May 5th, 2015 at Swissnex San Francisco. In 2004, Daniel White’s computer was infected with the Sasser worm, a fast-spreading autonomous worm that made millions of computers around the world reboot continuously. Fascinated by the concept of malware, he spent the following years learning everything he could about the subject, from general malware news to specific details of every virus, becoming a self-taught...
favoritefavoritefavoritefavoritefavorite ( 4 reviews )
Topics: Virus, History, Malware
The Malware Museum
software

eye 11,944

favorite 2

comment 3

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software

eye 4,804

favorite 1

comment 0

Malware Example: PPSCARE.COM *PPSCARE.COM - upon invocation, PingPongScare (tm) will become resident and clutter the screen with the characteristic "bouncing ball" of the PingPong boot block infector. Computing can continue while PingPongScare is in effect.
The Malware Museum
software

eye 5,751

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 8,059

favorite 4

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 12,704

favorite 2

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 12,743

favorite 2

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavorite ( 1 reviews )
The Malware Museum
software

eye 7,003

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 5,322

favorite 1

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 19,079

favorite 4

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 5,574

favorite 1

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 14,044

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 7,401

favorite 2

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 4,258

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
software

eye 10,137

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 4,593

favorite 1

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 84,849

favorite 3

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 6,668

favorite 3

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 7,506

favorite 3

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 5,426

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
software

eye 8,959

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 5,154

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 3,972

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 3,313

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 9,008

favorite 3

comment 3

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software

eye 7,389

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 6,358

favorite 1

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 4,183

favorite 2

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 4,603

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
( 1 reviews )
The Malware Museum
software

eye 16,257

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 3,887

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 3,929

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 4,388

favorite 1

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 3,070

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 2,593

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 4,196

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 3,435

favorite 1

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 2,895

favorite 2

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 2,489

favorite 0

comment 0

Malware Example: JERSCARE.COM *JERSCARE.COM - upon invocation, JerusalemScare (tm) becomes resident. After a short period of time - about a minute on most systems - Jerusa- lemScare will effect the characteristic Jerusalem virus system slowdown and scrolling black window effect on the left side of the monitor.
The Malware Museum
software

eye 4,870

favorite 3

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 11,279

favorite 2

comment 3

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 3 reviews )
The Malware Museum
software

eye 2,465

favorite 1

comment 0

Malware Example: CASCARE.COM *CASCARE.COM - upon invocation, CascadeScare (tm) will become resident. After a brief pause, the characteristic rat-a-tat sound of the Cascade virus and its nifty falling letters effect will be seen. This will continue intermittently, for as long as CascadeScare is resident. If the computer is in graphics mode, only the rat-a-tat sound effect will be noticed.
The Malware Museum
software

eye 2,889

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
The Malware Museum
software

eye 3,454

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 3,418

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 11,509

favorite 2

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 3,087

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
by Mikko Hyppönen
texts

eye 1,932

favorite 4

comment 0

This paper categorizes different types of virus activation routines which are found in existing viruses and also discusses what triggers these activation routines. Common viruses are used as examples where possible. This paper also covers why it is important to know what a virus exactly does if you are infected by one. Some horror stories of the worst possible activation routine in a virus are also included. The scope of this paper is limited to PC compatible machines.
Topics: virus, viruses, activation, routines, routine, antivirus, user, mosaic, hard, machine, activation...
The Malware Museum
software

eye 12,352

favorite 0

comment 2

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 2 reviews )
The Malware Museum
software

eye 3,467

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 3,175

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 5,689

favorite 1

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 4,302

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 17,593

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
software

eye 2,797

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 2,746

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 2,751

favorite 0

comment 0

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages. This item comes from a 1990 project of the British Computer Virus Research Centre, and contains additional controls to study the virus in action.
The Malware Museum
software

eye 2,821

favorite 0

comment 1

An example of an MS-DOS-based virus, now removed of its destructive capability but leaving its messages.
favoritefavoritefavoritefavorite ( 1 reviews )
The Malware Museum
by Mikko Hyppönen
texts

eye 1,339

favorite 3

comment 0

This paper will discuss methods viruses use or might use in the future to attack anti-virus programs. Attacks of this kind are becoming more common, as virus writers seem to be constantly looking for ways to make their viruses more efficient and vigorous. This paper also suggests how to make antivirus products more resistant against such attacks. The scope of this paper is limited to PC compatible machines
Topics: virus, program, viruses, attack, vims, scanner, programs, code, retrovirus, resident, virus...